Answer:the correct answer is the c)
An insider
Explanation:
Insiders that perform attacks have a distinct advantage over external attackers because they have authorized system access and also may be familiar with network architecture and system policies/procedures.